firewalld YAST2 module query??

i have made my interface default with the zone drop. i have also made the drop zone my default as well.

i have added a connection type for others to access my machine and i got this as a rule from ruleset:

tcp dport 8333 ct state new,untracked accept

i am a security conscious person…why is the connection untracked? shouldn’t they be tracked with nftables??

I think i can safely say that all rules created are the same in regards to being untracked. i can understand if localhost being untracked, but over the net, need more security